SlideShare a Scribd company logo
Cyber Security Technologies




      Presentation of the
 OnLine Digital Forensic Suite™


                                        Next-generation software for investigations
                                                  of live computers in networks . . .




      OnLineDFS Introduction - Proprietary & Confidential - Page 1
Focus

OnLine Digital Forensic Suite™ is
          a software product
    for the real-time investigation
of live, running systems in networks

               Product Heritage
   Core technology developed with SBIR
    funding from the US Air Force
   Productized for commercial market
   Patent pending




       OnLineDFS Introduction - Proprietary & Confidential - Page 2
Intended Uses



      Target Markets                                   Target Applications
   Fortune 5000                                    Incident Response
    Corporations                                        Insider Threat
   Government Agencies                                 External Threat
   Integrators                                     Compliance
   Service Providers                                   Information Assurance
   Law Enforcement                                 E-Discovery
                                                    Criminal Investigations




              OnLineDFS Introduction - Proprietary & Confidential - Page 3
OnLineDFS™ Deployment
                                           Corporate                                      System Under Investigation
Multi-User Version Depicted                Headquarters
                                                                                            Servers
          Investigator
       (Browser interface)


                                                                                  Corporate               Manufacturing Locations
                                     NOC (or other secure location)                Network

                                           OnLineDFS Application
    Any Location:                               & Data Store
    • Corporate
    • Field Location
    • Law Enforcement
    • Service Provider
    • Home Office, Hotel, etc.
 Note: Browser interface and                                                                             System Under Investigation
 OnLineDFS™ application can                Regional
          co-reside                         Offices
                                                                                                wired/wireless/mobile

                                                                  System Under Investigation
                                 OnLineDFS Introduction - Proprietary & Confidential - Page 4
OnLineDFS Today

 Volatile   State Data               Memory                                             Persistent   data
    29 sources of                        Acquisition                                       Files, folders,
     running state data                                                                       directories,
                                          Examination
     captured from                                                                            metadata, etc.
     Windows targets,                     Search
                                                                                             Unallocated and
     similar with Unix                Registry
     and Linux targets                                                                        slack space
                                          Walk
    Acquisition                                                                             Capture, search
                                          Acquisition
    Examination                                                                             Image disk
                                          Search

     Most volatile                                                                               Persistent




                     Summary of OnLineDFS Functionality



                          OnLineDFS Introduction - Proprietary & Confidential - Page 5
Key Attributes

   Built for the examination of running systems
      Collects information that is lost when computer is shut down
      Strong emphasis on volatile data and live examination of persistent data for
       rapid mitigation of risk
    “Plug-and-play” deployment
      OnLineDFS installed on network or subnet – no physical contact with target
       system required
      No pre-installed agents
      Straightforward, simple architecture
      Simple set-up and operation
      Technology can be readily integrated with other technologies
   Investigate from anywhere, to anywhere
      Investigator can work where the application is, or remotely from anywhere
       with Internet connectivity
      Investigations performed though secure network connection
      Wired/wireless/mobile targets OK
   Discreet, non-disruptive:
      Computer being analyzed is left in place
      No end-user involvement needed
      Investigative activity very difficult to detect
   Stable, solid product
      Release 3.6
      Designed to adhere to forensic best practices

                                                                                      4
              OnLineDFS Introduction - Proprietary & Confidential - Page 6
OnLineDFS Advantages

   Designed for use in an enterprise environment
      Built for on-line, real-time, networked world
      Drill down live to hosts with issues of investigative interest
      Proactive tool to address issues as they are happening
   No pre-installed agents
   Plug-and-play product based on simple architecture,
    very easy to deploy, maintain and use
   Discreet, unobtrusive, does not disrupt operations
   Flexible analytical approach fits real world
      Go where the data takes you, acquire what you need
   Enhances investigation productivity and timeliness
   Leverages investment in third-party tools
   Adheres to forensic best practices




                OnLineDFS Introduction - Proprietary & Confidential - Page 7
OnLineDFS Delivers


Law Enforcement                 An effective tool for investigations
                                in an enterprise environment



Enterprises                     A cost-effective tool to mitigate
                                risk, conduct investigations
                                effectively

Service Providers               A tool to deliver outstanding
                                customer timeliness and value


                OnLineDFS Introduction - Proprietary & Confidential - Page 8
Volatile Data Acquisition




    OnLineDFS Introduction - Proprietary & Confidential - Page 9
Memory and Registry




  OnLineDFS Introduction - Proprietary & Confidential - Page 10
Persistent Data




OnLineDFS Introduction - Proprietary & Confidential - Page 11
Data Analysis




OnLineDFS Introduction - Proprietary & Confidential - Page 12
Primary Data and Search




    OnLineDFS Introduction - Proprietary & Confidential - Page 13
Demonstration Scenario

 Network   security has observed unusual traffic
  on port 730 of host 192.168.171.202
 You are authorized to investigate this host and
  have the and administrative account and
  password necessary to perform the
  investigation




            OnLineDFS Introduction - Proprietary & Confidential - Page 14
Start the Investigation




   OnLineDFS Introduction - Proprietary & Confidential - Page 15
Perform the Initial Acquire




     OnLineDFS Introduction - Proprietary & Confidential - Page 16
Initial Acquire Completed




    OnLineDFS Introduction - Proprietary & Confidential - Page 17
Let’s look at the Volatile Data




      OnLineDFS Introduction - Proprietary & Confidential - Page 18
Look at Port 730 details




   OnLineDFS Introduction - Proprietary & Confidential - Page 19
Let’s look at WINWORD




   OnLineDFS Introduction - Proprietary & Confidential - Page 20
Dig Deeper




OnLineDFS Introduction - Proprietary & Confidential - Page 21
And Deeper




OnLineDFS Introduction - Proprietary & Confidential - Page 22
Acquire the WINWORD.exe




    OnLineDFS Introduction - Proprietary & Confidential - Page 23
Acquire the WINWORD.exe




    OnLineDFS Introduction - Proprietary & Confidential - Page 24
Acquire the WINWORD.exe




    OnLineDFS Introduction - Proprietary & Confidential - Page 25
Acquire Completed




 OnLineDFS Introduction - Proprietary & Confidential - Page 26
Let’s search within the acquired file




         OnLineDFS Introduction - Proprietary & Confidential - Page 27
Search Completed with 5 matches




        OnLineDFS Introduction - Proprietary & Confidential - Page 28
Let’s acquire memory




  OnLineDFS Introduction - Proprietary & Confidential - Page 29
Background Task




OnLineDFS Introduction - Proprietary & Confidential - Page 30
Memory Acquire Completed




     OnLineDFS Introduction - Proprietary & Confidential - Page 31
View Memory




OnLineDFS Introduction - Proprietary & Confidential - Page 32
Search for “Keylogger”




   OnLineDFS Introduction - Proprietary & Confidential - Page 33
Search Results-Six Matches




     OnLineDFS Introduction - Proprietary & Confidential - Page 34
Looks like a credit card entry




      OnLineDFS Introduction - Proprietary & Confidential - Page 35
Let’s find the suspect




  OnLineDFS Introduction - Proprietary & Confidential - Page 36
Start a new inquiry




 OnLineDFS Introduction - Proprietary & Confidential - Page 37
Look at Port 1142




OnLineDFS Introduction - Proprietary & Confidential - Page 38
Have a look at Telnet




  OnLineDFS Introduction - Proprietary & Confidential - Page 39
Search for credit card format




      OnLineDFS Introduction - Proprietary & Confidential - Page 40
Let’s find Amazon




OnLineDFS Introduction - Proprietary & Confidential - Page 41
Same data- he is the bad guy




      OnLineDFS Introduction - Proprietary & Confidential - Page 42
Comprehensive Documentation




      OnLineDFS Introduction - Proprietary & Confidential - Page 43
Let’s Review the Investigation

 Acquired   volatile data from host A
 Looked at port 730 details and found
  WINWORD.exe
 Acquired the WINWORD.exe file
 Determined that it is a keylogger
 Acquired memory and found the keylogger
  program and credit card data
 Referred back to the port 730 details and
  identified the IP address and port of the host
  connected to host A


           OnLineDFS Introduction - Proprietary & Confidential - Page 44
Let’s Review the Investigation

 With  this information, initiated a second
  investigation on host B
 From the volatile data acquired, we identified
  telnet as the process associated with port 1142
 Acquired memory and found the exact same
  credit card data as was found in the memory of
  host A
 Automatically generated detailed and
  thorough documentation of the entire
  investigation


            OnLineDFS Introduction - Proprietary & Confidential - Page 45
Cyber Security Technologies

                 Questions?




      OnLineDFS Introduction - Proprietary & Confidential - Page 46

More Related Content

What's hot

Fighting Fraud With Digital Forensics
Fighting Fraud With Digital ForensicsFighting Fraud With Digital Forensics
Fighting Fraud With Digital Forensics
TOMMY SEAH
 
GTB IRM - Business Use Cases - 2013
GTB IRM - Business Use Cases - 2013GTB IRM - Business Use Cases - 2013
GTB IRM - Business Use Cases - 2013
Ravindran Vasu
 
Pawaa OCC Presentation
Pawaa OCC PresentationPawaa OCC Presentation
Pawaa OCC Presentation
CloudComputing
 
Gtb Dlp Suite Presentation
Gtb Dlp Suite PresentationGtb Dlp Suite Presentation
Gtb Dlp Suite Presentation
gtbsalesindia
 
76 s201924
76 s20192476 s201924
76 s201924
IJRAT
 
Comparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniquesComparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniques
Yury Chemerkin
 
GTB Data Loss Prevention
GTB Data Loss PreventionGTB Data Loss Prevention
GTB Data Loss Prevention
refaeli
 
N.sai kiran IIITA AP
N.sai kiran IIITA APN.sai kiran IIITA AP
N.sai kiran IIITA AP
sai Nagaragiri
 
OMG DDS Security, 3rd revised submission
OMG DDS Security, 3rd revised submissionOMG DDS Security, 3rd revised submission
OMG DDS Security, 3rd revised submission
Gerardo Pardo-Castellote
 
Hp Fortify Pillar
Hp Fortify PillarHp Fortify Pillar
Hp Fortify Pillar
Ed Wong
 
Week13
Week13Week13
Cyber forensic standard operating procedures
Cyber forensic standard operating proceduresCyber forensic standard operating procedures
Cyber forensic standard operating procedures
Soumen Debgupta
 
One-stop shop for software development information
One-stop shop for software development informationOne-stop shop for software development information
One-stop shop for software development information
Aftab Iqbal
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
Dr Raghu Khimani
 
Chfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays WorldChfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays World
gueste0d962
 
Gigamon U - Eye Of The Fire, Network Malware Control System
Gigamon U - Eye Of The Fire, Network Malware Control SystemGigamon U - Eye Of The Fire, Network Malware Control System
Gigamon U - Eye Of The Fire, Network Malware Control System
Grant Swanson
 
Rothke Using Kazaa To Test Your Security Posture
Rothke   Using Kazaa To Test Your Security PostureRothke   Using Kazaa To Test Your Security Posture
Rothke Using Kazaa To Test Your Security Posture
Ben Rothke
 
Lecture on Use of Modern devices and Techniques for Evidence as envisaged in ...
Lecture on Use of Modern devices and Techniques for Evidence as envisaged in ...Lecture on Use of Modern devices and Techniques for Evidence as envisaged in ...
Lecture on Use of Modern devices and Techniques for Evidence as envisaged in ...
Ahmad Ali Kasuri Advocate
 
Cyber security assocham
Cyber security assochamCyber security assocham
Cyber security assocham
nmrdkoz
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
Andrew Wong
 

What's hot (20)

Fighting Fraud With Digital Forensics
Fighting Fraud With Digital ForensicsFighting Fraud With Digital Forensics
Fighting Fraud With Digital Forensics
 
GTB IRM - Business Use Cases - 2013
GTB IRM - Business Use Cases - 2013GTB IRM - Business Use Cases - 2013
GTB IRM - Business Use Cases - 2013
 
Pawaa OCC Presentation
Pawaa OCC PresentationPawaa OCC Presentation
Pawaa OCC Presentation
 
Gtb Dlp Suite Presentation
Gtb Dlp Suite PresentationGtb Dlp Suite Presentation
Gtb Dlp Suite Presentation
 
76 s201924
76 s20192476 s201924
76 s201924
 
Comparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniquesComparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniques
 
GTB Data Loss Prevention
GTB Data Loss PreventionGTB Data Loss Prevention
GTB Data Loss Prevention
 
N.sai kiran IIITA AP
N.sai kiran IIITA APN.sai kiran IIITA AP
N.sai kiran IIITA AP
 
OMG DDS Security, 3rd revised submission
OMG DDS Security, 3rd revised submissionOMG DDS Security, 3rd revised submission
OMG DDS Security, 3rd revised submission
 
Hp Fortify Pillar
Hp Fortify PillarHp Fortify Pillar
Hp Fortify Pillar
 
Week13
Week13Week13
Week13
 
Cyber forensic standard operating procedures
Cyber forensic standard operating proceduresCyber forensic standard operating procedures
Cyber forensic standard operating procedures
 
One-stop shop for software development information
One-stop shop for software development informationOne-stop shop for software development information
One-stop shop for software development information
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
 
Chfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays WorldChfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays World
 
Gigamon U - Eye Of The Fire, Network Malware Control System
Gigamon U - Eye Of The Fire, Network Malware Control SystemGigamon U - Eye Of The Fire, Network Malware Control System
Gigamon U - Eye Of The Fire, Network Malware Control System
 
Rothke Using Kazaa To Test Your Security Posture
Rothke   Using Kazaa To Test Your Security PostureRothke   Using Kazaa To Test Your Security Posture
Rothke Using Kazaa To Test Your Security Posture
 
Lecture on Use of Modern devices and Techniques for Evidence as envisaged in ...
Lecture on Use of Modern devices and Techniques for Evidence as envisaged in ...Lecture on Use of Modern devices and Techniques for Evidence as envisaged in ...
Lecture on Use of Modern devices and Techniques for Evidence as envisaged in ...
 
Cyber security assocham
Cyber security assochamCyber security assocham
Cyber security assocham
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
 

Similar to Online DFS

2012 Data Center Security
2012 Data Center Security2012 Data Center Security
2012 Data Center Security
Szymon Dowgwillowicz-Nowicki
 
Josh Diakun - Cust Pres - Splunk Partner Event
Josh Diakun - Cust Pres - Splunk Partner EventJosh Diakun - Cust Pres - Splunk Partner Event
Josh Diakun - Cust Pres - Splunk Partner Event
Josh D
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
ipspat
 
Splunk FISMA for Continuous Monitoring
Splunk FISMA for Continuous Monitoring Splunk FISMA for Continuous Monitoring
Splunk FISMA for Continuous Monitoring
Greg Hanchin
 
Implementing Big Data at the Speed of Business
Implementing Big Data at the Speed of BusinessImplementing Big Data at the Speed of Business
Implementing Big Data at the Speed of Business
DataWorks Summit
 
ASFWS 2011 - Secure software development for mobile devices
ASFWS 2011 - Secure software development for mobile devicesASFWS 2011 - Secure software development for mobile devices
ASFWS 2011 - Secure software development for mobile devices
Cyber Security Alliance
 
How a Cloud Computing Provider Reached the Holy Grail of Visibility
How a Cloud Computing Provider Reached the Holy Grail of VisibilityHow a Cloud Computing Provider Reached the Holy Grail of Visibility
How a Cloud Computing Provider Reached the Holy Grail of Visibility
eladgotfrid
 
Secure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPSecure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLP
Fidelis Cybersecurity
 
Defining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentDefining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case Assessment
Aubrey Owens
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
Amazon Web Services
 
Splunk - Verwandeln Sie Datensilos in Operational Intelligence
Splunk - Verwandeln Sie Datensilos in Operational IntelligenceSplunk - Verwandeln Sie Datensilos in Operational Intelligence
Splunk - Verwandeln Sie Datensilos in Operational Intelligence
Splunk
 
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromCONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin Nystrom
PROIDEA
 
Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary
Intel IT Center
 
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
jmical
 
Virtual Gov Day - Application Delivery Breakout - Overview
Virtual Gov Day - Application Delivery Breakout - OverviewVirtual Gov Day - Application Delivery Breakout - Overview
Virtual Gov Day - Application Delivery Breakout - Overview
Splunk
 
encase enterprise
 encase enterprise  encase enterprise
encase enterprise
Damir Delija
 
Dirty Little Secret - Mobile Applications Invading Your Privacy
Dirty Little Secret - Mobile Applications Invading Your PrivacyDirty Little Secret - Mobile Applications Invading Your Privacy
Dirty Little Secret - Mobile Applications Invading Your Privacy
Tyler Shields
 
2015 Angelbeat_ConvergenceMsg-FINAL
2015 Angelbeat_ConvergenceMsg-FINAL2015 Angelbeat_ConvergenceMsg-FINAL
2015 Angelbeat_ConvergenceMsg-FINAL
Rick Kingsley
 
Cybersecurity exchange briefing oct 2012 v2
Cybersecurity exchange briefing oct 2012 v2Cybersecurity exchange briefing oct 2012 v2
Cybersecurity exchange briefing oct 2012 v2
Naba Barkakati
 
Webinar on Enterprise Security & android
Webinar on Enterprise Security & androidWebinar on Enterprise Security & android
Webinar on Enterprise Security & android
Endeavour Software Technologies
 

Similar to Online DFS (20)

2012 Data Center Security
2012 Data Center Security2012 Data Center Security
2012 Data Center Security
 
Josh Diakun - Cust Pres - Splunk Partner Event
Josh Diakun - Cust Pres - Splunk Partner EventJosh Diakun - Cust Pres - Splunk Partner Event
Josh Diakun - Cust Pres - Splunk Partner Event
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Splunk FISMA for Continuous Monitoring
Splunk FISMA for Continuous Monitoring Splunk FISMA for Continuous Monitoring
Splunk FISMA for Continuous Monitoring
 
Implementing Big Data at the Speed of Business
Implementing Big Data at the Speed of BusinessImplementing Big Data at the Speed of Business
Implementing Big Data at the Speed of Business
 
ASFWS 2011 - Secure software development for mobile devices
ASFWS 2011 - Secure software development for mobile devicesASFWS 2011 - Secure software development for mobile devices
ASFWS 2011 - Secure software development for mobile devices
 
How a Cloud Computing Provider Reached the Holy Grail of Visibility
How a Cloud Computing Provider Reached the Holy Grail of VisibilityHow a Cloud Computing Provider Reached the Holy Grail of Visibility
How a Cloud Computing Provider Reached the Holy Grail of Visibility
 
Secure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPSecure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLP
 
Defining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentDefining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case Assessment
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Splunk - Verwandeln Sie Datensilos in Operational Intelligence
Splunk - Verwandeln Sie Datensilos in Operational IntelligenceSplunk - Verwandeln Sie Datensilos in Operational Intelligence
Splunk - Verwandeln Sie Datensilos in Operational Intelligence
 
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromCONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin Nystrom
 
Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary
 
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
 
Virtual Gov Day - Application Delivery Breakout - Overview
Virtual Gov Day - Application Delivery Breakout - OverviewVirtual Gov Day - Application Delivery Breakout - Overview
Virtual Gov Day - Application Delivery Breakout - Overview
 
encase enterprise
 encase enterprise  encase enterprise
encase enterprise
 
Dirty Little Secret - Mobile Applications Invading Your Privacy
Dirty Little Secret - Mobile Applications Invading Your PrivacyDirty Little Secret - Mobile Applications Invading Your Privacy
Dirty Little Secret - Mobile Applications Invading Your Privacy
 
2015 Angelbeat_ConvergenceMsg-FINAL
2015 Angelbeat_ConvergenceMsg-FINAL2015 Angelbeat_ConvergenceMsg-FINAL
2015 Angelbeat_ConvergenceMsg-FINAL
 
Cybersecurity exchange briefing oct 2012 v2
Cybersecurity exchange briefing oct 2012 v2Cybersecurity exchange briefing oct 2012 v2
Cybersecurity exchange briefing oct 2012 v2
 
Webinar on Enterprise Security & android
Webinar on Enterprise Security & androidWebinar on Enterprise Security & android
Webinar on Enterprise Security & android
 

More from Pablo Llanos Urraca

Teldat formación
Teldat formaciónTeldat formación
Teldat formación
Pablo Llanos Urraca
 
Eltein en la revista Koop
Eltein en la revista KoopEltein en la revista Koop
Eltein en la revista Koop
Pablo Llanos Urraca
 
Manual erd commander
Manual erd commanderManual erd commander
Manual erd commander
Pablo Llanos Urraca
 
Eltein mantenimiento informatico
Eltein mantenimiento informaticoEltein mantenimiento informatico
Eltein mantenimiento informatico
Pablo Llanos Urraca
 
El swing plate de una hp laser jet 4200
El swing plate de una hp laser jet 4200El swing plate de una hp laser jet 4200
El swing plate de una hp laser jet 4200
Pablo Llanos Urraca
 
Stycol900
Stycol900Stycol900
Analisis de En Case Forensics
Analisis de En Case ForensicsAnalisis de En Case Forensics
Analisis de En Case Forensics
Pablo Llanos Urraca
 
Reparacion de pantallas LG
Reparacion de pantallas LGReparacion de pantallas LG
Reparacion de pantallas LG
Pablo Llanos Urraca
 
Delitos Informáticos. Análisis Forense
Delitos Informáticos. Análisis ForenseDelitos Informáticos. Análisis Forense
Delitos Informáticos. Análisis Forense
Pablo Llanos Urraca
 

More from Pablo Llanos Urraca (9)

Teldat formación
Teldat formaciónTeldat formación
Teldat formación
 
Eltein en la revista Koop
Eltein en la revista KoopEltein en la revista Koop
Eltein en la revista Koop
 
Manual erd commander
Manual erd commanderManual erd commander
Manual erd commander
 
Eltein mantenimiento informatico
Eltein mantenimiento informaticoEltein mantenimiento informatico
Eltein mantenimiento informatico
 
El swing plate de una hp laser jet 4200
El swing plate de una hp laser jet 4200El swing plate de una hp laser jet 4200
El swing plate de una hp laser jet 4200
 
Stycol900
Stycol900Stycol900
Stycol900
 
Analisis de En Case Forensics
Analisis de En Case ForensicsAnalisis de En Case Forensics
Analisis de En Case Forensics
 
Reparacion de pantallas LG
Reparacion de pantallas LGReparacion de pantallas LG
Reparacion de pantallas LG
 
Delitos Informáticos. Análisis Forense
Delitos Informáticos. Análisis ForenseDelitos Informáticos. Análisis Forense
Delitos Informáticos. Análisis Forense
 

Recently uploaded

Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 

Recently uploaded (20)

Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 

Online DFS

  • 1. Cyber Security Technologies Presentation of the OnLine Digital Forensic Suite™ Next-generation software for investigations of live computers in networks . . . OnLineDFS Introduction - Proprietary & Confidential - Page 1
  • 2. Focus OnLine Digital Forensic Suite™ is a software product for the real-time investigation of live, running systems in networks Product Heritage  Core technology developed with SBIR funding from the US Air Force  Productized for commercial market  Patent pending OnLineDFS Introduction - Proprietary & Confidential - Page 2
  • 3. Intended Uses Target Markets Target Applications  Fortune 5000  Incident Response Corporations  Insider Threat  Government Agencies  External Threat  Integrators  Compliance  Service Providers  Information Assurance  Law Enforcement  E-Discovery  Criminal Investigations OnLineDFS Introduction - Proprietary & Confidential - Page 3
  • 4. OnLineDFS™ Deployment Corporate System Under Investigation Multi-User Version Depicted Headquarters Servers Investigator (Browser interface) Corporate Manufacturing Locations NOC (or other secure location) Network OnLineDFS Application Any Location: & Data Store • Corporate • Field Location • Law Enforcement • Service Provider • Home Office, Hotel, etc. Note: Browser interface and System Under Investigation OnLineDFS™ application can Regional co-reside Offices wired/wireless/mobile System Under Investigation OnLineDFS Introduction - Proprietary & Confidential - Page 4
  • 5. OnLineDFS Today  Volatile State Data  Memory  Persistent data  29 sources of  Acquisition  Files, folders, running state data directories,  Examination captured from metadata, etc. Windows targets,  Search  Unallocated and similar with Unix  Registry and Linux targets slack space  Walk  Acquisition  Capture, search  Acquisition  Examination  Image disk  Search Most volatile Persistent Summary of OnLineDFS Functionality OnLineDFS Introduction - Proprietary & Confidential - Page 5
  • 6. Key Attributes  Built for the examination of running systems  Collects information that is lost when computer is shut down  Strong emphasis on volatile data and live examination of persistent data for rapid mitigation of risk  “Plug-and-play” deployment  OnLineDFS installed on network or subnet – no physical contact with target system required  No pre-installed agents  Straightforward, simple architecture  Simple set-up and operation  Technology can be readily integrated with other technologies  Investigate from anywhere, to anywhere  Investigator can work where the application is, or remotely from anywhere with Internet connectivity  Investigations performed though secure network connection  Wired/wireless/mobile targets OK  Discreet, non-disruptive:  Computer being analyzed is left in place  No end-user involvement needed  Investigative activity very difficult to detect  Stable, solid product  Release 3.6  Designed to adhere to forensic best practices 4 OnLineDFS Introduction - Proprietary & Confidential - Page 6
  • 7. OnLineDFS Advantages  Designed for use in an enterprise environment  Built for on-line, real-time, networked world  Drill down live to hosts with issues of investigative interest  Proactive tool to address issues as they are happening  No pre-installed agents  Plug-and-play product based on simple architecture, very easy to deploy, maintain and use  Discreet, unobtrusive, does not disrupt operations  Flexible analytical approach fits real world  Go where the data takes you, acquire what you need  Enhances investigation productivity and timeliness  Leverages investment in third-party tools  Adheres to forensic best practices OnLineDFS Introduction - Proprietary & Confidential - Page 7
  • 8. OnLineDFS Delivers Law Enforcement An effective tool for investigations in an enterprise environment Enterprises A cost-effective tool to mitigate risk, conduct investigations effectively Service Providers A tool to deliver outstanding customer timeliness and value OnLineDFS Introduction - Proprietary & Confidential - Page 8
  • 9. Volatile Data Acquisition OnLineDFS Introduction - Proprietary & Confidential - Page 9
  • 10. Memory and Registry OnLineDFS Introduction - Proprietary & Confidential - Page 10
  • 11. Persistent Data OnLineDFS Introduction - Proprietary & Confidential - Page 11
  • 12. Data Analysis OnLineDFS Introduction - Proprietary & Confidential - Page 12
  • 13. Primary Data and Search OnLineDFS Introduction - Proprietary & Confidential - Page 13
  • 14. Demonstration Scenario  Network security has observed unusual traffic on port 730 of host 192.168.171.202  You are authorized to investigate this host and have the and administrative account and password necessary to perform the investigation OnLineDFS Introduction - Proprietary & Confidential - Page 14
  • 15. Start the Investigation OnLineDFS Introduction - Proprietary & Confidential - Page 15
  • 16. Perform the Initial Acquire OnLineDFS Introduction - Proprietary & Confidential - Page 16
  • 17. Initial Acquire Completed OnLineDFS Introduction - Proprietary & Confidential - Page 17
  • 18. Let’s look at the Volatile Data OnLineDFS Introduction - Proprietary & Confidential - Page 18
  • 19. Look at Port 730 details OnLineDFS Introduction - Proprietary & Confidential - Page 19
  • 20. Let’s look at WINWORD OnLineDFS Introduction - Proprietary & Confidential - Page 20
  • 21. Dig Deeper OnLineDFS Introduction - Proprietary & Confidential - Page 21
  • 22. And Deeper OnLineDFS Introduction - Proprietary & Confidential - Page 22
  • 23. Acquire the WINWORD.exe OnLineDFS Introduction - Proprietary & Confidential - Page 23
  • 24. Acquire the WINWORD.exe OnLineDFS Introduction - Proprietary & Confidential - Page 24
  • 25. Acquire the WINWORD.exe OnLineDFS Introduction - Proprietary & Confidential - Page 25
  • 26. Acquire Completed OnLineDFS Introduction - Proprietary & Confidential - Page 26
  • 27. Let’s search within the acquired file OnLineDFS Introduction - Proprietary & Confidential - Page 27
  • 28. Search Completed with 5 matches OnLineDFS Introduction - Proprietary & Confidential - Page 28
  • 29. Let’s acquire memory OnLineDFS Introduction - Proprietary & Confidential - Page 29
  • 30. Background Task OnLineDFS Introduction - Proprietary & Confidential - Page 30
  • 31. Memory Acquire Completed OnLineDFS Introduction - Proprietary & Confidential - Page 31
  • 32. View Memory OnLineDFS Introduction - Proprietary & Confidential - Page 32
  • 33. Search for “Keylogger” OnLineDFS Introduction - Proprietary & Confidential - Page 33
  • 34. Search Results-Six Matches OnLineDFS Introduction - Proprietary & Confidential - Page 34
  • 35. Looks like a credit card entry OnLineDFS Introduction - Proprietary & Confidential - Page 35
  • 36. Let’s find the suspect OnLineDFS Introduction - Proprietary & Confidential - Page 36
  • 37. Start a new inquiry OnLineDFS Introduction - Proprietary & Confidential - Page 37
  • 38. Look at Port 1142 OnLineDFS Introduction - Proprietary & Confidential - Page 38
  • 39. Have a look at Telnet OnLineDFS Introduction - Proprietary & Confidential - Page 39
  • 40. Search for credit card format OnLineDFS Introduction - Proprietary & Confidential - Page 40
  • 41. Let’s find Amazon OnLineDFS Introduction - Proprietary & Confidential - Page 41
  • 42. Same data- he is the bad guy OnLineDFS Introduction - Proprietary & Confidential - Page 42
  • 43. Comprehensive Documentation OnLineDFS Introduction - Proprietary & Confidential - Page 43
  • 44. Let’s Review the Investigation  Acquired volatile data from host A  Looked at port 730 details and found WINWORD.exe  Acquired the WINWORD.exe file  Determined that it is a keylogger  Acquired memory and found the keylogger program and credit card data  Referred back to the port 730 details and identified the IP address and port of the host connected to host A OnLineDFS Introduction - Proprietary & Confidential - Page 44
  • 45. Let’s Review the Investigation  With this information, initiated a second investigation on host B  From the volatile data acquired, we identified telnet as the process associated with port 1142  Acquired memory and found the exact same credit card data as was found in the memory of host A  Automatically generated detailed and thorough documentation of the entire investigation OnLineDFS Introduction - Proprietary & Confidential - Page 45
  • 46. Cyber Security Technologies Questions? OnLineDFS Introduction - Proprietary & Confidential - Page 46